What would be the correct response to this question?
You are performing a penetration test and are tasked with verifying function access control. Consider the followi